Filtrer par type de contenu
Sélectionnez un ou plusieurs filtres. Ce choix permettra de recharger la page pour afficher les résultats filtrés.
718 résultats
-
-
Séminaire
-
SoSysec
From Deciding Knowledge to Intrusion Detection
Orateur : Yannick Chevalier - Université de Toulouse
By interpreting terms as distributions over strings, Abadi and Rogaway proved under suitable assumptions that indistinguishability in the computational setting, accepted as the impossibility for an observer to acquire knowledge from observing a protocol execution, is equivalent to formal equivalence in a symbolic setting. This result led to multiple results on “deciding knowledge” using static[…]-
SoSysec
-
Intrusion detection
-
-
-
Séminaire
-
SemSecuElec
Une approche langages pour comprendre et affronter les injections de fautes
Orateur : Sébastien Michelland - Université Grenoble Alpes, Grenoble INP, LCIS
Est-ce que votre dernier programme fonctionnerait si je sautais une ligne de code ? Deux ? Si je corrompais une variable aléatoirement ? Alors il ne résiste pas aux _attaques par injection de faute_, qui ciblent le matériel et produisent ce type d'effets. Pour être honnête, rien n'y résiste vraiment. Les efforts pour s'en protéger ont malgré tout bien progressé, principalement (et c'est peut-être[…]-
SemSecuElec
-
Injection de fautes
-
-
-
Séminaire
-
SemSecuElec
Acquisition and Exploitation of Traces from Connected Devices
Orateur : Francesco Servida - École des Sciences Criminelles, Université de Lausanne
This presentation aims to give an overview of the traces that can be obtained from connected objects as witnesses or actors at a crime scene. Using several scenarios we cover the challenges of detecting connected devices, the relevant locations for data retrieval and the techniques for acquiring said data. We then present how such data can be useful in helping to understand the dynamics of events[…]-
SemSecuElec
-
Embedded systems
-
-
-
Séminaire
-
Cryptographie
Updatable Public Key Encryption with Lattices
Orateur : Calvin Abou-Haidar - ENS Lyon
Updatable public key encryption has recently been introduced as a so- lution to achieve forward-security in the context of secure group messaging without hurting efficiency, but so far, no efficient lattice-based instantia- tion of this primitive is known. In this work, we construct the first LWE-based UPKE scheme with polynomial modulus-to-noise rate, which is CPA-secure in the standard model. At[…] -
-
-
Séminaire
-
Cryptographie
Generic SCARE: reverse engineering without knowing the algorithm nor the machine
Orateur : Hélène LE BOUDER - IMT Atlantique
A novel side-channel-based reverse engineering technique is introduced, capable of reconstructing a procedure solely from inputs, outputs, and traces of execution. Beyond generic restrictions, no prior knowledge of the procedure or the chip it operates on is assumed. These restrictions confine the analysis to 8-bit RISC constant-time software implementations. Specifically, the feasibility of[…] -
-
-
Séminaire
-
Cryptographie
Finding short integer solutions when the modulus is small
Orateur : Eamonn Postlethwaite - King's College London
We present cryptanalysis of the inhomogenous short integer solution (ISIS) problem for anomalously small moduli by exploiting the geometry of BKZ reduced bases of q-ary lattices. We apply this cryptanalysis to examples from the literature where taking such small moduli has been suggested. A recent work [Espitau–Tibouchi–Wallet–Yu, CRYPTO 2022] suggests small versions of the lattice signature[…] -